+ certs.clear();
+ }
+
+ void testCertificatesFromURLs() {
+ string pathname = data_path + "cert.pem.bak";
+ auto_ptr<SOAPTransport> t1(getTransport("https://spaces.internet2.edu/download/attachments/5305/cert.pem"));
+ SecurityHelper::loadCertificatesFromURL(certs, *t1.get(), pathname.c_str());
+ pathname = data_path + "cert.der.bak";
+ auto_ptr<SOAPTransport> t2(getTransport("https://spaces.internet2.edu/download/attachments/5305/cert.der"));
+ SecurityHelper::loadCertificatesFromURL(certs, *t2.get(), pathname.c_str());
+ pathname = data_path + "test.pfx.bak";
+ auto_ptr<SOAPTransport> t3(getTransport("https://spaces.internet2.edu/download/attachments/5305/test.pfx"));
+ SecurityHelper::loadCertificatesFromURL(certs, *t3.get(), pathname.c_str(), NULL, "password");
+
+ TSM_ASSERT_EQUALS("Wrong certificate count", certs.size(), 3);
+
+ auto_ptr<XSECCryptoKey> key1(certs[0]->clonePublicKey());
+ auto_ptr<XSECCryptoKey> key2(certs[0]->clonePublicKey());
+ auto_ptr<XSECCryptoKey> key3(certs[0]->clonePublicKey());
+
+ TSM_ASSERT("PEM/DER keys did not match", SecurityHelper::matches(key1.get(), key2.get()));
+ TSM_ASSERT("DER/PKCS12 keys did not match", SecurityHelper::matches(key2.get(), key3.get()));
+
+ for_each(certs.begin(), certs.end(), xmltooling::cleanup<XSECCryptoX509>());
+ certs.clear();